Entity

Time filter

Source Type

Colorado Springs, CO, United States

Colorado Technical University is a for-profit university in the United States. Founded in 1965, CTU offers undergraduate, graduate, and doctoral degrees, primarily in business, management, and technology. The university is regionally accredited by the Higher Learning Commission of the North Central Association of Colleges and Schools . It is a subsidiary of Career Education Corporation, which has been facing increasing government scrutiny at the state and federal levels.Colorado Tech's graduation rate is approximately 15-31%, depending on the campus and academic major. The online graduation rate is 20%.In 2013, USA Today listed three of Colorado Tech's programs, including its online program, as "red flag" schools for having student loan default rates that surpassed their graduation rates. Wikipedia.


Xia Z.,Nanjing University of Information Science and Technology | Wang X.,Nanjing University of Information Science and Technology | Sun X.,Nanjing University of Information Science and Technology | Liu Q.,University of Southern Brittany | Xiong N.,Colorado Technical University
Multimedia Tools and Applications | Year: 2016

This paper models the messages embedded by spatial least significant bit (LSB) matching as independent noises to the cover image, and reveals that the histogram of the differences between pixel gray values is smoothed by the stego bits despite a large distance between the pixels. Using the characteristic function of difference histogram (DHCF), we prove that the center of mass of DHCF (DHCF COM) decreases after messages are embedded. Accordingly, the DHCF COMs are calculated as distinguishing features from the pixel pairs with different distances. The features are calibrated with an image generated by average operation, and then used to train a support vector machine (SVM) classifier. The experimental results prove that the features extracted from the differences between nonadjacent pixels can help to tackle LSB matching as well. © 2014, Springer Science+Business Media New York. Source


Liu X.,Jiangxi University of Finance and Economics | Chen L.,Hong Kong University of Science and Technology | Wan C.,Jiangxi University of Finance and Economics | Liu D.,Jiangxi University of Finance and Economics | Xiong N.,Colorado Technical University
Information Sciences | Year: 2013

Keyword search on XML documents has received considerable research interests recently. Most existing methods put their emphases on the document side, and focus on how to utilize structural properties of XML documents to produce better search results, more effective ranking methods, or more efficient algorithms. However, effective XML search requires a full understanding of not only XML documents but also XML keyword queries, whereas little attention has been paid to the latter. In this paper, we focus on the query side of XML keyword search instead of the document side. We show that keyword queries have structures, and define a concept called keyword query with structure (QWS) to capture query structure. As query structure provides hints about the intent of the query, it can be used to improve the quality of the search results. We exploit some key observations to characterize the structure in a keyword query and show how to refine search results with the assistance of query structure. In order to take the benefits of query structure, we design a query processing approach to produce results given a keyword query. It first derives some QWSs based on heuristics, and computes results of these queries, then expands the results if needed. We implement the proposed methods and conduct comprehensive experiments. Experimental results verify the effectiveness of our methods. © 2013 Elsevier Inc. All rights reserved. Source


Fang W.,Beijing Jiaotong University | Liang X.,Beijing Jiaotong University | Li S.,Beijing Jiaotong University | Chiaraviglio L.,Polytechnic University of Turin | Xiong N.,Colorado Technical University
Computer Networks | Year: 2013

In recent years, the power costs of cloud data centers have become a practical concern and have attracted significant attention from both industry and academia. Most of the early works on data center energy efficiency have focused on the biggest power consumers (i.e., computer servers and cooling systems), yet without taking the networking part into consideration. However, recent studies have revealed that the network elements consume 10-20% of the total power in the data center, which poses a great challenge to effectively reducing network power cost without adversely affecting overall network performance. Based on the analysis on topology characteristics and traffic patterns of data centers, this paper presents a novel approach, called VMPlanner, for network power reduction in the virtualization-based data centers. The basic idea of VMPlanner is to optimize both virtual machine placement and traffic flow routing so as to turn off as many unneeded network elements as possible for power saving. We formulate the optimization problem, analyze its hardness, and solve it by designing VMPlanner as a stepwise optimization approach with three approximation algorithms. VMPlanner is implemented and evaluated in a simulated environment with traffic traces collected from a data center test-bed, and the experiment results illustrate the efficacy and efficiency of this approach.© 2012 Elsevier B.V. All rights reserved. Source


Chebrolu S.B.,Colorado Technical University
Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012 | Year: 2012

Adoption of cloud computing has reached an important inflection point that is impacting IT and business strategies and models throughout the industry. There is lack of empirical evidence how cloud adoption and certain capabilities of cloud in particular, impact individual aspects of IT effectiveness like IT quality of service, user satisfaction, and IT helpfulness to users. The intent of this research was to contribute to the body of knowledge that could be applied by researchers, businesses, and IT organizations alike to achieve optimal results by focusing on the most useful capabilities of cloud based services and solutions and elements within them. The study findings provided statistical evidence that certain elements within cloud compatibility have much stronger correlation with various aspects of IT effectiveness than the rest. The new knowledge gained would enhance the decision-making process for IT managers when considering the adoption of cloud technologies and its business models. © 2012 IEEE. Source


Ayed A.B.,Colorado Technical University
Journal of Theoretical and Applied Information Technology | Year: 2016

Android is an open source platform based on Linux kernel; it is one of the first operating systems that use a permission mechanism to control access to resources. The permission mechanism is fine gained and can control what a particular process could and could not perform. Therefore, these permissions should be monitored closely to make sure they are not assigned to the wrong application. This study is not intended to create an anti-malware solution, instead it uses the permissions to classify and categorize android applications. This paper is offering a novel way of using the self-organizing map to study a set of malware application and try to find a pattern of permission requests. This pattern could be used to analyze the application and compare it against the pattern identified earlier using the self-organizing map. © 2005-2016 JATIT & LLS. All rights reserved. Source

Discover hidden collaborations